15.09.2015 Views

Establishing a High-Tech Cyber Crime Response System

Establishing a High-Tech Cyber Crime Response System - Korea.net

Establishing a High-Tech Cyber Crime Response System - Korea.net

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

successfully stole the data by inducing trackers to go to a remote intermediate<br />

point.<br />

The <strong>Cyber</strong> Terror <strong>Response</strong> Center created a joint investigation team with<br />

related government bodies after the case. The newly created team came up<br />

with the correct analysis on the status and security measures, and distributed<br />

a “back-door vaccine” they had created. As a next step, they promptly<br />

restored the damaged systems, investigated the leaked classified information,<br />

and blocked the access to the intermediate point.<br />

Finally, the joint investigation team detected that the connecting point was in<br />

China and asked for cooperation from the Chinese government via Korea’s<br />

Ministry of Foreign Affairs and Trade. After the investigation, the culprits were<br />

found to be hackers belonging to the People’s Liberation Army.<br />

election irregularities.<br />

In response to these activities, the <strong>Cyber</strong> Terror <strong>Response</strong> Center prepared<br />

a 24-hour surveillance structure for the web sites. Also a 24-hour surveillance<br />

system was constructed by committing 600 cyber surveillance agents in order<br />

to block illegal election campaigning on the Internet. At the same time, 112<br />

centers were set up to quickly arrest anyone involved with election irregularities<br />

using PC cafes. As a result, 1066 cases were uncovered and 1152 people,<br />

accounting for 20.8% of the total 5548 election irregularities, were arrested for<br />

cyber election irregularities during the election. Also 3000 web sites that were<br />

related to parties and candidates were under surveillance for 24-hours in order<br />

to regulate false reporting on candidates. This contributed to a cleaner and<br />

fairer election atmosphere and cyber election culture.<br />

3. Clean and fair elections through controlling election<br />

irregularities<br />

Many election irregularities occurred due to the increase in number of<br />

Internet users and diversified participation in politics through the Internet. The<br />

Internet was used as an important method of election campaigning in local<br />

elections (6.13), educational committee election (7.11) and the National<br />

Assembly and by-elections (8.8) in 2002. Moreover, after realizing the<br />

significance of netizens in the 16th presidential election, candidates and voters<br />

actively used the internet in subsequent election campaigns. Especially in<br />

during the 17th National Assembly election (April 15, 2004), the number of<br />

cyber election irregularities showed a rapid increase. Pre-election campaigning<br />

such as leaving feedback online, slandering opposition candidates, or<br />

supporting specific candidates were the most common form of the cyber<br />

4. Securing the safety of the internet through solving cases<br />

and consistent academic research<br />

Other than the facts mentioned above, the cyber terror response center<br />

secured the safety of the internet by solving numerous types of cases. The<br />

details are as follows:<br />

Apprehension of 30 domestic Commercial communication network<br />

Hackers (1997. August)<br />

Apprehension of members of CVC, the biggest domestic computer virus<br />

producer (1998, February)<br />

Apprehension of suspects who hacked into the KAIST network and<br />

leaked confidential data regarding “Woori byul” (1999, March)<br />

Apprehension of suspects who produced a worm virus for the purpose of<br />

cyber terror (2000, February)<br />

302 Dynamics of Government Innovation and Decentralization in Korea<br />

<strong>Establishing</strong> a <strong>High</strong>-<strong>Tech</strong> <strong>Cyber</strong> <strong>Crime</strong> <strong>Response</strong> <strong>System</strong><br />

303

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!